【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
CE
解析
暂无解析
相关试题
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator
【单选题】
How does the 802. 1x supplicant communicate with the authentication server?___
A. The supplicant creates EAP packets and sends them to the authenticator, which encapsulates them into RADIUS and forwards them to the authentication server.
B. The supplicant creates RADIUS packets and sends them to the authe nticator, which encapsulates the m into EAP and forwards them to the a uthentication server.
C. The supplicant creates RADIUS packets and sends them to the authenticator, which translates them into eap and forwards them to the a ut hentication server
D. The supplicant creates
E. AP packets and sends them to the authe nticator, which translates them into radius and forwards them to the authentication server.
【单选题】
Which command do you enter to verify the phase I status of a VPN connection?___
A. sh crypto se ssion
B. debug crypto isakmp
C. sh crypto isakmp sa
D. sh crypto ipsec sa
【单选题】
Refer to the exhibit. what is the e ffect of the given configuration?___
A. It enables authentication,
B. It prevents keychain authentication.
C. The two routers receive normal updates from one another.
D. The two device s are able to pass the message digest to one another.
【单选题】
Which command can you enter to configure OSPF to use hashing to authenticate routing updates?___
A. ip ospf aut hentication message-digest
B. neighbor 192 168.0 112 cost md5
C. ip ospf priority 1
D. ip ospf aut hentication-key
【单选题】
Which command can you enter to verify the status of Cisco lOS Resilient Configuration on a Cisco router?___
A. show secure bootset
B. secure boot-image
C. show binary file
D. ure boot-config
【单选题】
A user on your network inadvertently activates a botnet program that was received as an emai attachment. Which type of mechanism does Cisco Firepower use to detect and block only the botnet attack?___
A. network-based access control rule
B. reputation-based
C. user-ba sed access control rule
D. botnet traffic filter
【单选题】
What does the policy map do in CoPP?___
A. defines service parameters
B. defines packet selection parameters
C. defines the packet filter
D. define s the action to be performed
【单选题】
How is management traffic isolated on a Cisco ASR 1002?___
A. Traffic isolation is done on the vlan level
B. There is no management traffic isolation on a Cisco ASR 1002
C. Traffic is isolated based upon how you configure routing on the device
D. The management interface is configured in a special vRF that provides traffic isolation from the default routing table
【单选题】
Which statement about NaT table evaluation in the asa is true?___
A. After-auto NAT polices are appl d first
B. Manual NAT policies are applied first
C. the asa uses the most specific match
D. Auto NAT policies are applied first
【单选题】
Which information can you display by executing the show crypto ipsec sa command?___
A. ISAKMP SAs that are established between two peers
B. recent changes to the IP address of a peer router
C. proxy infor mation for the connection between two peers
D. IPsec SAs established between two peers
【单选题】
How can you prevent NAT rules from sending traffic to incorrect interfaces?___
A. Assign the output interface in the NAT statement
B. Add the no-proxy-arp command to the nat line.
C. Configure twice NAT instead o bject NAT. 5
D. Use packet-tracer rules to reroute misrouted NAT entries.
【单选题】
What term can be defined as the securing, control, and identification of digital data?___
A. cryptography
B. crypto key
C. cryptoanalysis
D. cryptology
推荐试题
【单选题】
“生产成本”、“制造费用”等成本费用类明细账一般采用___账簿。
A. 三栏式
B. 借方多栏式
C. 数量金额式
D. 贷方多栏式
【单选题】
现金日记账和银行存款日记账必须采用___账簿
A. 活页式
B. 订本式
C. 备查
D. 复币
【单选题】
账簿按___的不同,可分为序时账簿、分类账簿、备查账簿。
A. 用途
B. 外表形式
C. 格式
D. 启用时间
【单选题】
在一定期间内连续记录若干项同类经济业务的会计凭证是___
A. 原始凭证
B. 累计凭证
C. 记账凭证
D. 一次凭证
【单选题】
费用(成本)类账户的借方登记___
A. 增加发生额
B. 减少发生额
C. 增加或减少发生额
D. 本期结转数
【单选题】
“预付账款”账户的期末余额等于___
A. 期初余额+贷方发生额—借方发生额
B. 期初余额+借方发生额—贷方发生额
C. 期初余额+贷方发生额+借方发生额
D. 期初余额—贷方发生额—借方发生额
【单选题】
会计科目按其所反映的经济内容的详细程度分类,可以分为___
A. 二级科目和三级科目
B. 资产类、负债类、所有者权益类、成本类、损益类
C. 一级科目和二级科目
D. 一级科目和明细科目
【单选题】
“会计”这一名词出现于我国下列哪一时期___
A. 西周
B. 东周
C. 秦
D. 西汉
【单选题】
建立持续经营假设的目的是___。
A. 为了保证企业的生产经营活动的正常进行
B. 为了保证企业的会计核算的正常进行
C. 货币计量与实物计量需要
D. 破产清算的需要
【单选题】
取得银行借款存入银行将引起___。
A. 资产一增一减
B. 资产和负债同时增加
C. 资产和所有者权益同时增加
D. 资产和所有者权益一增一减
【单选题】
由动态三要素组成的会计等式是___。
A. 资产=负债+所有者权益
B. 资产=负债+权益
C. 收入-费用=利润
D. 资产+费用=负债+所有者权益
【单选题】
预付款项属于___。
A. 债权
B. 基金
C. 费用
D. 资本
【单选题】
复式记账以___为理论依据。
A. 资金运动规律
B. 利润的计算
C. 会计等式
D. 资产的增减
【单选题】
保证会计核算系统性的必要措施或专门方法是___。
A. 设立会计科目与账户
B. 填制和审核会计凭证
C. 复式记账
D. 登记账薄
【单选题】
在下列项目中,属于国家统一规定的一级会计科目的是___。
A. 应交增值税
B. 专利权
C. 利息费用
D. 所得税费用
【单选题】
某企业资产总额100万元,本期发生下列经济业务:(1)用银行存款购买原材料20万元;(2)用银行存款偿还企业的贷款10万元;(3)实际收到前期赊销款15万元。期末企业资产总额是___。
A. 55万元
B. 85万元
C. 90万元
D. 105万元
【单选题】
会计账户是根据___分别设置的。
A. 会计对象
B. 会计要素
C. 会计科目
D. 经济业务
【单选题】
“原材料’’账户期初有余额3000万元,本期发生购进业务两笔,金额分别为5300万元、2000万元;本期材料领用两笔,金额分别为4000万元、1000万元。本期借方发生额及余额是___。
A. 7300万元和5300万元
B. 10300万元和5000万元
C. 7300万元和2300万元
D. 10300万元和8000万元
【单选题】
可以合并成的一个复合分录是___
A. 借:原材料30000,贷:银行存款30000
B. 借:原材料50000,贷:银行存款40000,应付账款10000
C. 借:原材料50000贷:银行存款10000,应付账款40000
D. 借:原材料50000,贷:银行存款50000
【单选题】
经查明原因,转出应由出纳员赔偿的现金短款200元,会计分录是___。
A. 借:其他应收款
B. 借:其他应收款
【单选题】
T形账户的左边为___。
A. 增加栏
B. 减少栏
C. 借方
D. 贷方
【单选题】
___的核算口径比总分类账户稍细,比明细分类账户稍粗。
A. 一级账户
B. 二级账户
C. 对应账户
D. 生产成本类账户
【单选题】
___是记录经济业务事项发生或完成情况的书面证明,是登记账簿的依据。
A. 会计要素
B. 会计账户
C. 会计凭证
D. 会计分录
【单选题】
下列各项中不属于原始凭证填制要求的是___。
A. 任何原始凭证都必须加盖本单位公章
B. 有大小写的原始凭证,大小写必须相等
C. (暂缺)
D. (暂缺)
【单选题】
小写金额数字一律填写到角分,有角无分的,分位写___。
A. “00”
B. “0”
C. “一”
D. “/”
【单选题】
用转账支票支付前欠货款,应填制___。
A. 转账凭证
B. 付款凭证
C. 收款凭证
D. 原始凭证
【单选题】
下列有关单式记账凭证的说法正确的是___。
A. 单式记账凭证是指将每一笔经济业务所涉及的全部会计科目及其内容在同一张记账凭证中反映的记账凭证
B. 单式记账凭证是指将每笔经济业务所涉及的每一会计科目及其内容分别独立地反
C. 其不便于会计分工记账以及按会计科目汇总
D. 其便于反映经济业务的全貌以及账户的对应关系
【单选题】
销售产品一批,部分货款对方存人本企业银行账户,部分货款对方暂欠时,应填制的记账凭证是___。
A. 收款凭证和转账凭证
B. 付款凭证和转账凭证
C. 收款凭证和付款凭证
D. 两张转账凭证
【单选题】
在我国,企业一般只对___的明细核算采用卡片账形式。
A. 原材料
B. 库存商品
C. 固定资产
D. 生产成本
【单选题】
下列有关备查账簿说法错误的是___。
A. 备查账簿可以为某项经济业务的内容提供必要的参考资料
B. 备查账簿可以由各单位根据需要进行设置
C. 租人固定资产登记簿属于备查账簿
D. 备查账簿除主要栏目记录金额外,还注重用文字来表述某项经济业务的发生隋况。
【单选题】
在启用会计账簿时,应当在账簿封面上写明___。
A. 单位负责人名字
B. 单位、账簿名称
C. 会计主管名字
D. 记账人员名字
【单选题】
下列总账科目中,一般可以不设明细账的是___。
A. 管理费用
B. 销售费用
C. 累计折旧
D. 应收账款
【单选题】
三栏式明细分类账设有___三个栏目。
A. 借方、贷方和余额
B. 收入、支出和结余
C. 数量、单价和金额
D. 增加、减少和结存
【单选题】
库存商品明细账一般采用的格式是___。
A. 两栏式
B. 三栏式
C. 多栏式
D. 数量金额式
【单选题】
账证核对不包括___。
A. 账簿记录与原始凭证、记账凭证的时间是否一致
B. 账簿记录与原始凭证、记账凭证的凭证字号是否一致
C. 账簿记录与原始凭证、记账凭证的金额是否一致
D. 账簿记录与原始凭证、记账凭证的签名盖章是否一致
【单选题】
在采用划线更正法更正时,下列不正确的作法是___。
A. 对错误数字,划线时,整体一起划掉
B. 由记账及相关人员在更正处盖章以示负责
C. 将正确的更正数字写在上方
D. 将正确的更正数字写在下方
【单选题】
需要结计本年累计发生额的某些明细账户,每月结账时,应在“本月合计”行下结出___的累计发生额,登记在月份发生额下面。
A. 自年初起至本月末止
B. 自月初起至本月末止
C. 自年初起至本年末止
D. 自月初起至本年末止
【单选题】
目前,我国所采用的账务处理程序中最基本的是___。
A. 记账凭证账务处理程序
B. 科目汇总表账务处理程序
C. 汇总记账凭证账务处理程序
D. 日记总账账务处理程序
【单选题】
编制科目汇总表的直接依据是___凭证。
A. 汇总原始
B. 记账
C. 原始
D. 转账
【单选题】
汇总记账凭证不包括___。
A. 汇总收款凭证
B. 汇总付款凭证
C. 汇总转账凭证
D. 记账凭证汇总表